The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in Apache ActiveMQ to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in Apache ActiveMQ, tracked as CVE-2026-34197 (CVSS score of 8.8), to its Known Exploited Vulnerabilities (KEV) catalog. CVE-2026-34197 is a critical flaw in Apache ActiveMQ caused by […]
A vulnerability, which was classified as critical, has been found in Dell PowerProtect Data Domain up to 7.13.1.50/8.3.1.20/8.5. This impacts an unknown function. The manipulation leads to use of weak credentials.
This vulnerability is uniquely identified as CVE-2026-23853. Local access is required to approach this attack. No exploit exists.
A vulnerability classified as problematic was found in lukevella rallly up to 4.7.4. This affects an unknown function of the file apps/web/src/app/[locale]/(auth)/reset-password/components/reset-password-form.tsx of the component Reset Password Handler. Executing a manipulation of the argument redirectTo can lead to cross site scripting.
This vulnerability is handled as CVE-2026-6493. The attack can be executed remotely. Additionally, an exploit exists.
Upgrading the affected component is advised.
The vendor was contacted early about this disclosure.
A vulnerability classified as problematic has been found in arnobt78 Hotel Booking Management System up to f8922d0e0f6ac1cc761974c7616f44c2bbc04bea. The impacted element is an unknown function of the file /api/health/detailed of the component Health Check Endpoint. Performing a manipulation results in information disclosure.
This vulnerability is known as CVE-2026-6492. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. It is suggested to use restrictive firewalling.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as problematic has been identified in libvips up to 8.18.2. The affected element is the function im_minpos_vec of the file libvips/deprecated/vips7compat.c of the component nip2 Handler. Such manipulation of the argument n leads to heap-based buffer overflow.
This vulnerability is traded as CVE-2026-6491. An attack has to be approached locally. Furthermore, there is an exploit available.
The vendor confirms that they will "be removing the deprecated area in libvips 8.19".
A vulnerability marked as critical has been reported in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. Impacted is an unknown function of the file admin/deletecourse.php of the component GET Request Parameter Handler. This manipulation of the argument ID causes sql injection.
This vulnerability appears as CVE-2026-6490. The attack may be initiated remotely. In addition, an exploit is available.
This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability labeled as critical has been found in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. This issue affects some unknown processing of the file admin/addteacher.php of the component Background Management Page. The manipulation of the argument image results in unrestricted upload.
This vulnerability is reported as CVE-2026-6489. The attack can be launched remotely. Moreover, an exploit is present.
This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability identified as critical has been detected in QueryMine sms up to 7ab5a9ea196209611134525ffc18de25c57d9593. This vulnerability affects unknown code of the file admin/editcourse.php of the component GET Request Parameter Handler. The manipulation of the argument ID leads to sql injection.
This vulnerability is documented as CVE-2026-6488. The attack can be initiated remotely. Additionally, an exploit exists.
Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
The vendor was contacted early about this disclosure but did not respond in any way.